Suspicious
Suspect

2386f6fe79f060e2ba7617160dae16b6

PE Executable
|
MD5: 2386f6fe79f060e2ba7617160dae16b6
|
Size: 1.58 MB
|
application/x-dosexec


Print
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
2386f6fe79f060e2ba7617160dae16b6
Sha1
1408cacef37dd1bd75d1b24762e74041752d1339
Sha256
b8c953c0e089328ce75c4a27793d442fe89b14c585c09bcce8a448124d3f64ab
Sha384
c4a81e5ef204567c47b7a55126ccca303f91f58925d7acf68a614e5498d5ea505446f7da299a3428a1d96b5d715b629c
Sha512
8568c3cc2078503af1d9b843104263513f2ab81dc3d4d7523991069b08e00b7ddbed0e8e4e4ba3f830cf557122a9df31603ef54c01cebb5cb520398d857445fd
SSDeep
24576:26cSAeEoHcORzLCqbJFUIiX5E/KN0U1ZpFRCWfaPBO80Ui2S+pKVYFyS4hEX:KmRb+hL2aZpFRC7eUipTV03X
TLSH
BC753331E77EC4CDF1397D35E66E52CA146FFB862988C824782B34D38AB09560DEB560

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual C++ v6.0 DLL
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
a
Informations
Name
Value
Module Name

temploader.exe

Full Name

temploader.exe

EntryPoint

System.Void a.a::Main()

Scope Name

temploader.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

temploader

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

3

Main Method

System.Void a.a::Main()

Main IL Instruction Count

37

Main IL

call System.Reflection.Assembly System.Reflection.Assembly::GetExecutingAssembly() ldstr 8Mw/lEz6M+P20gJKTnLeTA== ldstr 4hwlgPclVVyDWDgmHTvib4USc1PsJ5dlYV4ptLuzBuc= ldstr yA9Tt2MEFn797zEzKWI+bw== call System.String �笌鳾篩ᇡ㙟倴꡽::帆萢흪玱턵잼曊⍪쯟ಝ(System.String,System.String,System.String) callvirt System.IO.Stream System.Reflection.Assembly::GetManifestResourceStream(System.String) stloc.0 <null> newobj System.Void System.IO.MemoryStream::.ctor() stloc.1 <null> ldloc.0 <null> ldc.i4.0 <null> newobj System.Void System.IO.Compression.DeflateStream::.ctor(System.IO.Stream,System.IO.Compression.CompressionMode) stloc.2 <null> ldloc.2 <null> ldloc.1 <null> callvirt System.Void System.IO.Stream::CopyTo(System.IO.Stream) leave IL_0046: ldloc.1 ldloc.2 <null> brfalse IL_0045: endfinally ldloc.2 <null> callvirt System.Void System.IDisposable::Dispose() endfinally <null> ldloc.1 <null> callvirt System.Byte[] System.IO.MemoryStream::ToArray() call System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) callvirt System.Reflection.MethodInfo System.Reflection.Assembly::get_EntryPoint() ldnull <null> ldnull <null> callvirt System.Object System.Reflection.MethodBase::Invoke(System.Object,System.Object[]) pop <null> leave IL_0070: ret ldloc.0 <null> brfalse IL_006F: endfinally ldloc.0 <null> callvirt System.Void System.IDisposable::Dispose() endfinally <null> ret <null>

Module Name

temploader.exe

Full Name

temploader.exe

EntryPoint

System.Void a.a::Main()

Scope Name

temploader.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

temploader

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

3

Main Method

System.Void a.a::Main()

Main IL Instruction Count

37

Main IL

call System.Reflection.Assembly System.Reflection.Assembly::GetExecutingAssembly() ldstr 8Mw/lEz6M+P20gJKTnLeTA== ldstr 4hwlgPclVVyDWDgmHTvib4USc1PsJ5dlYV4ptLuzBuc= ldstr yA9Tt2MEFn797zEzKWI+bw== call System.String �笌鳾篩ᇡ㙟倴꡽::帆萢흪玱턵잼曊⍪쯟ಝ(System.String,System.String,System.String) callvirt System.IO.Stream System.Reflection.Assembly::GetManifestResourceStream(System.String) stloc.0 <null> newobj System.Void System.IO.MemoryStream::.ctor() stloc.1 <null> ldloc.0 <null> ldc.i4.0 <null> newobj System.Void System.IO.Compression.DeflateStream::.ctor(System.IO.Stream,System.IO.Compression.CompressionMode) stloc.2 <null> ldloc.2 <null> ldloc.1 <null> callvirt System.Void System.IO.Stream::CopyTo(System.IO.Stream) leave IL_0046: ldloc.1 ldloc.2 <null> brfalse IL_0045: endfinally ldloc.2 <null> callvirt System.Void System.IDisposable::Dispose() endfinally <null> ldloc.1 <null> callvirt System.Byte[] System.IO.MemoryStream::ToArray() call System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) callvirt System.Reflection.MethodInfo System.Reflection.Assembly::get_EntryPoint() ldnull <null> ldnull <null> callvirt System.Object System.Reflection.MethodBase::Invoke(System.Object,System.Object[]) pop <null> leave IL_0070: ret ldloc.0 <null> brfalse IL_006F: endfinally ldloc.0 <null> callvirt System.Void System.IDisposable::Dispose() endfinally <null> ret <null>

Artefacts
Name
Value
Embedded Resources

1

Suspicious Type Names (1-2 chars)

1

2386f6fe79f060e2ba7617160dae16b6 (1.58 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙